Presentation | 1994/3/18 Verification of Unsecure Paths in Access Matrixes with AI Approach Tetsuya Morizumi, Hisao Suzuki, Keisuke Usuda, Shigeo Tsujii, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | There is a method using access control for database system security.This is secure if there is no covert chnnel.In this paper, we propose a system which verify covert channels in an access matrix based on The Blackboard Architecture. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cryptography / Access Matrix / Covert Channel / Verification / search |
Paper # | ISEC93-99 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1994/3/18(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Verification of Unsecure Paths in Access Matrixes with AI Approach |
Sub Title (in English) | |
Keyword(1) | Cryptography |
Keyword(2) | Access Matrix |
Keyword(3) | Covert Channel |
Keyword(4) | Verification |
Keyword(5) | search |
1st Author's Name | Tetsuya Morizumi |
1st Author's Affiliation | Toyo Communication Equipment Co.,Ltd.() |
2nd Author's Name | Hisao Suzuki |
2nd Author's Affiliation | Faculty of Engineering,Tokyo Institute of Technology |
3rd Author's Name | Keisuke Usuda |
3rd Author's Affiliation | School of Information Science,Japan Advanced Institute of Science and Technology,Hokuriku |
4th Author's Name | Shigeo Tsujii |
4th Author's Affiliation | Faculty of Engineering,Tokyo Institute of Technology |
Date | 1994/3/18 |
Paper # | ISEC93-99 |
Volume (vol) | vol.93 |
Number (no) | 525 |
Page | pp.pp.- |
#Pages | 9 |
Date of Issue |